Описание
By checking the result of calls to window.open
with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.
The Mozilla Foundation's Security Advisory: By checking the result of calls to window.open with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed.
Отчет
Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 7 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 9 | firefox | Affected | ||
Red Hat Enterprise Linux 9 | firefox-flatpak-container | Affected | ||
Red Hat Enterprise Linux 9 | thunderbird-flatpak-container | Affected | ||
Red Hat Enterprise Linux 7 Extended Lifecycle Support | firefox | Fixed | RHSA-2024:7702 | 07.10.2024 |
Red Hat Enterprise Linux 8 | thunderbird | Fixed | RHSA-2024:7699 | 07.10.2024 |
Red Hat Enterprise Linux 8 | firefox | Fixed | RHSA-2024:7700 | 07.10.2024 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | firefox | Fixed | RHSA-2024:7646 | 03.10.2024 |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS3
Связанные уязвимости
By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.
By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.
By checking the result of calls to `window.open` with specifically set ...
By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.
Уязвимость функции Window.open() браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
EPSS
4.3 Medium
CVSS3